Search results for: security and growth for all in the region
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12957

Search results for: security and growth for all in the region

12747 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems

Authors: Mirko Sailio

Abstract:

Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.

Keywords: border automation, cyber-security, threat actors, border cyber-security

Procedia PDF Downloads 198
12746 The Role of Intellectual Security Immunisation in Reducing Extremism in the Kingdom of Saudi Arabia, 1979 – 2019

Authors: Anas Abdulrahman A. Almiman

Abstract:

In recent decades, efforts to combat extremism have focused on non-physical dimensions, as various countries have attempted to raise security awareness or promote authentic and moderate Islamic education. The Kingdom of Saudi Arabia is one of the most successful and unique cases because it has focused on the immunization of Islamic intellectual security to combat extremism. This study aims to define the concept and importance of Islamic intellectual security in the Kingdom of Saudi Arabia through a descriptive-analytical study. It describes the potential role of Islamic intellectual security immunization in reducing extremism in the Kingdom of Saudi Arabia from 1979 to 2019, identifying various factors that connect Islamic intellectual security immunization to extremism reduction. One such factor is the MISK Foundation’s forums and conferences intended to raise Islamic intellectual security and reduce intellectual deviation, thus reducing extremism. It concludes that the common significant factor for Islamic intellectual deviation is direct commands and prohibitions. This study supports the efforts made by the Kingdom of Saudi Arabia to immunize Islamic intellectual security and fight extremism as a consequence.

Keywords: extremism, intellectual security immunization , Saudi Arabia, Islamic

Procedia PDF Downloads 189
12745 Electricity Consumption and Economic Growth: The Case of Mexico

Authors: Mario Gómez, José Carlos Rodríguez

Abstract:

The causal relationship between energy consumption and economic growth has been an important issue in the economic literature. This paper studies the causal relationship between electricity consumption and economic growth in Mexico for the period of 1971-2011. In so doing, unit root tests and causality test are applied. The results show that the series are stationary in levels and that there is causality running from economic growth to energy consumption. The energy conservation policies have little or no impact on economic growth in México.

Keywords: causality, economic growth, energy consumption, Mexico

Procedia PDF Downloads 846
12744 The Influence of an Occupation as a Calling on the Value of Job Security and Its Connection with Wage Levels

Authors: Malul Miki, Rafi Bar-El, Eithan Hourie

Abstract:

In this article, we test the influence of an occupation as a calling on the value of job security and its connection with wage levels. Our sample consists of 495 workers in Israel from 10 occupations in the public sector, who are assumed to have a relatively high level of job security, and the private sector, who are assumed to have less job security or none at all. These 10 occupations are social workers, lecturers, lawyers, administration workers, accountants, high school teachers, bank workers, high-tech worker, nurses and psychologists. Using regression analysis, we find that those who have occupations that the literature has defined as a calling value job security less than those in ordinary employment. In addition, salary level has no effect on this relationship. Finally, those who work in occupations that are regarded as a calling have less status quo bias than those in ordinary employment.

Keywords: calling, loss aversion, job security, status quo bias

Procedia PDF Downloads 101
12743 Significance of the 2015 Comprehensive Strategic Partnership Agreement to the Foreign Policies of Australia and Singapore in the Indo-Pacific Region

Authors: Iraj Musa Dawaari

Abstract:

Australia and Singapore signed the Comprehensive Strategic Partnership (CSP) agreement on 29th June 2015. This agreement aims to strengthen security, defense, diplomatic, economic, education, and innovation cooperation, as well as people-to-people relations between the two states. The purpose of this study is to examine rationales underpinning the (2015 CSP) agreement in order to better understand the national and foreign policy priorities of both Australia and Singapore in the period leading up to the signing of the agreement and in the period since. This research project will seek to establish how both countries’ national and foreign policy priorities have developed in recent years in the light of growing tensions between China and the US in the Indo-Pacific region and how the CSP agreement has influenced these priorities. This project also seeks to better understand and analyse why both states signed the CSP agreement in 2015.

Keywords: Australia, Singapore, foreign policy, partnership, USA, China, Indo-Pacific Region

Procedia PDF Downloads 129
12742 Impact of the Government Ghana Block Farm Program on Rural Households in Northern Ghana

Authors: Antwi Kwaku Dei, Lyford Conrad Power

Abstract:

This paper investigates the outcome of participating in the government of Ghana block farm program on rural households’ farm productivity, income, food security and nutritional status in Northern Ghana using cross-sectional data. Data analysis was done using the Instrumental Variable and the Heckman Selection Bias procedures. Our analysis indicates that participation in the block farm program significantly increased directly the productivity of maize, rice, and soybean by 21.3 percent, 15.8 percent, and 12.3 percent respectively. Also, the program participation was found to increase households’ farm income by 20 percent in northern Ghana. Furthermore, program participation was found to improve household food security and nutrition by 19 percent and 14 percent respectively through income effect. Based on the benefit-cost ratio of 1.59 the results from the study recommends that the program is expanded to other communities in the northern region. Further analysis indicates that rural households’ decision to participate in food security intervention programs is significantly influenced by factors including the gender of the household head, the age of the household head, and household size. Results of the study further show that gender of household head, household size, household monthly income, household assets, women educational status, the age of women, marital status of women, are significant determinants of food security and nutrition status in Northern Ghana.

Keywords: block farm program, farm productivity, , household food security, Northern Ghana

Procedia PDF Downloads 273
12741 Effect of Inflorescence Removal and Earthing-Up Times on Growth and Yield of Potato (Solanum tuberosum L.) at Jimma Southwestern Ethiopia

Authors: Dessie Fisseha, Derbew Belew, Ambecha Olika

Abstract:

Potato is a high-potential food security crop in Ethiopia. However, the yield and productivity of the crop have been far below the world average. This is due to several factors, including appropriate agronomic practices, such as time of earthing-up and inflorescence management. A field experiment was conducted at Jimma, Southwest Ethiopia, during 2016/17 under irrigation to determine the effect of time of earthing-up and inflorescence removal on the growth, yield, and quality of potatoes. The treatments consisted of a time of earthing-up (no earthing-up, earthing-up at 15, 30, and 45 days after complete plant emergence) and inflorescence removal (inflorescence removed and not removed). Potato variety (Belete) was used for this experiment. A 2x4 factorial experiment was laid out with three replications. Data collected on the growth, yield, and quality components of potatoes were analyzed using SAS Version 9.3 statistical software. Inflorescence removal affected the majority of the growth and yield parameters, while the time of earthing-up affected all growth, yield, and quality (green tuber number) parameters. Earthing-up at 15 days in combination with inflorescence removal (at 60 days after complete plant emergence) gave better plant growth and maximum tuber yield of the Belete potato variety under irrigated conditions. Since the current research was conducted at one location, in one season, and with one potato cultivar (Belete), it would be advisable to repeat the experiment so as to arrive at a final conclusion and subsequent recommendation.

Keywords: Belete, earthing-up, inflorescence, yield

Procedia PDF Downloads 65
12740 Resourcing Remote Rural Social Enterprises to Foster Resilience and Regional Development

Authors: Heather Fulford, Melanie Liddell

Abstract:

The recruitment and retention of high quality employees can prove to be challenging for social enterprises, particularly in some of the core business support functions such as marketing, communications, IT and finance. This holds true for social enterprises in urban contexts, where roles with more attractive remuneration in these business functions can often be found quite readily in the private sector. For social enterprises situated in rural locations, the challenges of staff recruitment and retention are even more acute. Such challenges can lead to a skills deficit in rural social enterprises, which can, at best, hinder their growth potential, and worse, jeopardise their chances of survival. This in turn, can have a negative impact on the sustainability and resilience of the surrounding rural community in which the social enterprise is located. The purpose of this paper is to report on aspects of a collaborative initiative established to stimulate innovation and business growth in remote rural businesses in Scotland. Launched in 2010, this initiative was designed to attract young students and graduates from the region to stay in the region upon completion of their studies, and to attract others from outside the region to re-locate there post-university. To facilitate this, SMEs in the region were offered wage subsidies to encourage them to recruit a student or graduate on a work placement for up to one year to participate in an innovation or business growth-oriented project. A number of the employers offering work placements were social enterprises. Through analysis of the placement project and role specifications devised by the participating social enterprises, an overview is provided of their business development needs and the skills they require to stimulate innovation and growth. Scrutiny of the reflective accounts compiled by the students and graduates at the close of their work placements highlights the benefits they derived from being able to put their academic knowledge and skills into action within a social enterprise. Examination of interviews conducted with a sample of placement employers reveals the contribution the students and graduates made during the business development projects with the social enterprises. The challenges of hosting such placements are also discussed. The paper concludes with indications of the lessons learned and an outline of the wider implications for other remote rural locations in which social enterprises play an important role in the local economy and life of the community.

Keywords: resilience, rural development, regeneration, regional development, recruitment, resource management, retention, remuneration

Procedia PDF Downloads 310
12739 Concerted Strategies for Sustainable Water Resource Management in Semi-Arid Rajasthan State of India

Authors: S. K. Maanju, K. Saha, Sonam Yadav

Abstract:

Rapid urbanization growth and multi-faceted regional level industrialization is posing serious threat to natural groundwater resource in State of Rajasthan which constitute major semi-arid part of India. The groundwater resources of the State are limited and cannot withstand the present rate of exploitation for quite a long time. Recharging of groundwater particularly in the western part, where annual precipitation does not exceed a few centimeters, is extremely slow and cannot replenish the exploited quantum. Hence, groundwater in most of the parts of this region has become an exhausting resource. In major parts water table is lowering down rapidly and continuously. The human beings of this semi-arid region are used to suffering from extreme climatic conditions of arid to semi-arid nature and acute shortage of water. The quality of groundwater too in many areas of this region is not up to the standards prescribed by the health organizations like WHO and BIS. This semi-arid region is one of the highly fluoride contaminated area of India as well as have excess, nitrates, sulphates, chlorides and total dissolved solids at various locations. Therefore, concerted efforts are needed towards sustainable development of groundwater in this State of India.

Keywords: Rajasthan, water, exploitation, sustainable, development and resource

Procedia PDF Downloads 344
12738 Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups

Authors: Erhan Turgut, Salih Ergün, Abdülkadir Öz

Abstract:

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed.

Keywords: terrorism, counter-terrorism, military status law-enforcement, terrorist groups

Procedia PDF Downloads 453
12737 Intelligent Recognition Tools for Industrial Automation

Authors: Amin Nazerzadeh, Afsaneh Nouri Houshyar , Azadeh Noori Hoshyar

Abstract:

With the rapid growing of information technology, the industry and manufacturing systems are becoming more automated. Therefore, achieving the highly accurate automatic systems with reliable security is becoming more critical. Biometrics that refers to identifying individual based on physiological or behavioral traits are unique identifiers provide high reliability and security in different industrial systems. As biometric cannot easily be transferred between individuals or copied, it has been receiving extensive attention. Due to the importance of security applications, this paper provides an overview on biometrics and discuss about background, types and applications of biometric as an effective tool for the industrial applications.

Keywords: Industial and manufacturing applications, intelligence and security, information technology, recognition; security technology; biometrics

Procedia PDF Downloads 150
12736 Transformations of Land Uses and Attitudes in Manavgat Region at South Turkey

Authors: Emrah Yildirim, Veli Ortacesme

Abstract:

Manavgat region, located in Antalya province at South Turkey, has hosted many civilizations throughout the centuries. All of these civilizations cultivated the land in their surroundings by engaging in agriculture, livestock production and hunting. In the last 50 years, there have been dramatic changes in the region. The economy of the region switched from the agriculture to tourism. Due to the increase in the irrigable agricultural lands, several dams were built on Manavgat River. Developments in the agricultural mechanization and new product needs have changed the pattern of agriculture and regional landscape. Coastal zone of the region has transformed to tourism areas, Manavgat Town Center has grown up and the urbanization in general has increased. The population and urbanization have increased by 257 % and 276 %, respectively. The tourism and commercial areas cover 561,8 hectares today. All these developments had some negative effects on the environment. In this study, land use/land cover transformations were studied in Manavgat region by using aerial photos. The reasons and consequences of the land use transformations were discussed, and some recommendations regarding the sustainable use of this region’s landscape will be shared.

Keywords: land use, Manavgat region, south Turkey, transformation

Procedia PDF Downloads 396
12735 Measuring Entrepreneurial Success through Specific Sustainable Development Goals by Linking Entrepreneurship Attitude and Intentions

Authors: Mohit Taneja, Ravi Kiran, S. C. Bose

Abstract:

Entrepreneurs’ role in achieving Sustainable development goals is crucial as the growth potential of any region depends upon the number and the success rate of entrepreneurial firms. This paper is an effort to examine the relationship between Sustainable growth (SG) with Entrepreneurial attitude (EA) and Entrepreneurial intention (EI) in the context of the Indian economy. The mediation effect of EI between EA and SG has been considered. Partial least square (PLS) –Structural Equation Model (SEM) software was used to design the framework. Students enrolled in entrepreneurship courses of higher educational institutes (HEI) of Punjab, Haryana, and the National Capital Region NCR were contacted for data collection. The National Institutional Ranking Framework (NIRF) framework was used in selecting HEIs and data collected from 589 students was considered for analysis. McGee’s multi-dimensional scale for measuring ESE and the scale of Linan & Chen for measuring EI & ES (SG) was used. Results highlight that EA has a strong impact on EI (p≤ 0.001) and EI has a positive and strong relationship with SG (ES) as β value for the same is 0.683 (p≤ 0.001). The current study also reflects the mediating effect of EI among EA and ES, as the results show that the combined β value of both EA and EI (i.e.0.684*0.683= 0.467) is more than the direct influence of EA on ES (β=0.265). EA, with the mediating effect of EI can enhance the opportunity for achieving SG, which suggests that in order to increase the venture success rate and to attain SG, emphasis should be given to EI along with EA. The study has been investigated in three regions of India. Future studies can be extended to other South Asian countries for generalization.

Keywords: entrepreneurship, sustainable growth, entrepreneurship intention, entrepreneurship attitude

Procedia PDF Downloads 90
12734 Housing Security System and Household Entrepreneurship: Evidence from China

Authors: Wangshi Yong, Wei Shi, Jing Zou, Qiang Li, Yilin Tian

Abstract:

With the advancement of the reform of China’s housing security system, the impact is becoming increasingly profound. This paper explores the relationship between the housing security system and household entrepreneurship on the 2017 China Household Finance Survey (CHFS) and conducts a large number of robustness checks, including PSM and IV estimation. The results show that the assistance of the housing security system will significantly promote family entrepreneurship, increasing the probability of entrepreneurship by 2%. Its internal mechanism is mainly achieved by relaxing liquidity constraints and increasing household social capital. However, the risk preference effect has not existed. Heterogeneity analysis shows that the positive impact of the housing security system on family entrepreneurship is mainly reflected in areas with high housing prices and incomes, as well as households with long-term security and social or commercial insurance. Meanwhile, it also verifies that the positive externalities of the housing security system will also positively affect active entrepreneurial motivation, entrepreneurial intensity, and entrepreneurial innovation.

Keywords: the housing security system, household entrepreneurship, social capital, liquidity constraints, risk preference

Procedia PDF Downloads 79
12733 A Proposal for Systematic Mapping Study of Software Security Testing, Verification and Validation

Authors: Adriano Bessa Albuquerque, Francisco Jose Barreto Nunes

Abstract:

Software vulnerabilities are increasing and not only impact services and processes availability as well as information confidentiality, integrity and privacy, but also cause changes that interfere in the development process. Security test could be a solution to reduce vulnerabilities. However, the variety of test techniques with the lack of real case studies of applying tests focusing on software development life cycle compromise its effective use. This paper offers an overview of how a Systematic Mapping Study (MS) about security verification, validation and test (VVT) was performed, besides presenting general results about this study.

Keywords: software test, software security verification validation and test, security test institutionalization, systematic mapping study

Procedia PDF Downloads 400
12732 Venezuela in the US Oil Geopolitics: An Analysis in the Light of the New Oil Landscape

Authors: William Clavijo, Edmar Almeida

Abstract:

The article analyzes the importance of Venezuela in the US geopolitics of oil considering the new oil landscape. To this end, the importance of oil in the geopolitics of the United States is discussed from the perspective of energy security as well as considering a broader view of national security. Based on this discussion, the relevance of Venezuelan oil reserves on US geopolitical agenda is analyzed. Among the results, the article shows that the transformations in the supply structure of the international oil market during the last decade have allowed the United States to achieve greater levels of independence from oil imports from other producing countries. This new reality has profoundly changed the US interest in Venezuelan oil to a broader subject that involves sensitive issues of its national security agenda.

Keywords: oil geopolitics, Venezuela, United States, energy security, national security

Procedia PDF Downloads 160
12731 Polymorphism in Myostatin Gene and Its Association with Growth Traits in Kurdi Sheep of Northern Khorasan

Authors: Masoud Alipanah, Sekineh Akbari, Gholamreza Dashab

Abstract:

Myostatin genes or factor 8 affecting on growth and making differentiation works (GDF8) as a moderator in the development of skeletal muscle inhibitor. If mutations occurs in the coding region of myostatin, alter its inhibitory role and the muscle growth is increased. In this study, blood samples were collected randomly from 60 Kurdish sheep in northern Khorasan and DNA extraction was performed using a modified salt. A fragment 337 bp from exon 3 myostatin gene and-specific primers by using a polymerase chain reaction (PCR) were amplified. In order to detect different forms of an allele at this locus HaeΙΙΙ restriction enzymes and PCR-RFLP analysis were used. Band patterns clarification was performed using agarose gel electrophoresis. The frequency of genotypes mm, Mm, and MM, were respectively detected, 0, 0.15 and 0.85. The allele frequency for alleles m and M, were respectively, 0.07 and 0.93. The statistical analyses indicated that m allele was significantly associated with body weight. The results of this study suggest that the Myostatin gene possibly is a candidate gene that affects growth traits in Kurdish sheep.

Keywords: GDF8 gene, Kurdi Sheep of Northern Khorasan, polymorphism, weight traits

Procedia PDF Downloads 336
12730 Human Security through Human Rights in the Contemporary World

Authors: Shilpa Bagade Poharkar

Abstract:

The basis for traditional notion of security was the use of force to preserve vital interest which based on either realism or power politics. The modern approach to security extends beyond the traditional notions of security which focus on issues as development and respect for human rights. In global politics, the issue of human security plays a vital role in most of the policy matter. In modern era, the protection of human rights is now recognized as one of the main functions of any legitimate modern state. The research paper will explore the relationship between human rights and security. United Nations is facing major challenges like rampant poverty, refugee outflows, human trafficking, displacement, conflicts, terrorism, intra-inter ethnic conflicts, proliferation of small arms, genocide, piracy, climate change, health issues and so on. The methodology is observed in this paper is doctrinaire which includes analytical and descriptive comparative method. The hypothesis of the paper is the relationship between human rights and a goal of United Nations to attain peace and security. Although previous research has been done in this field but this research paper will try to find out the challenges in the human security through human rights in the contemporary world and will provide measures for it. The study will focus on the following research questions: What are the issues and challenges United Nations facing while advancing human security through human rights? What measures the international community would take for ensuring the protection of human rights while protecting state security and contribute in the attainment of goals of United Nations?

Keywords: human rights, human security, peace, security, United Nations

Procedia PDF Downloads 241
12729 Labor Welfare and Social Security

Authors: Shoaib Alvi

Abstract:

Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.

Keywords: labor welfare, internal social responsibility, social security, international conventions

Procedia PDF Downloads 566
12728 Georgian Social Security System Compatibility with EU Requirements

Authors: Nino Grigolaia

Abstract:

Introduction: The article discusses the experience of the EU in the social field, analyzes the peculiarities of the functioning of the social system in Georgia, and reveals the priority and importance of social policy. Methodology: Different research methods are applied in the presented paper. There are used induction, deduction, analysis, synthesis, analogy, correlation, and statistical observation methodologies in the work. Main Findings: Based on the analysis of social security reforms in Georgia, the main systematic problems are detected, the recommendations on social security system components, integration of the social security field in the unified insurance system, the formation of the national social system, perfection of the legislative, regulatory framework of social protection, adoption of foreign experience are developed in the article. Conclusion: The article concludes that the social protection system in Georgia is at an early stage of development, with the significant impact of factors such as high level of unemployment, low pensions, a large number of families living under the poverty line, and other ones. Accordingly, it is well-established that the study of the social security problem in Georgia is still actual. Based on the analysis, appropriate suggestions in the field of social security are made, and relevant recommendations are proposed.

Keywords: social security, social system, social policy, social security models

Procedia PDF Downloads 139
12727 International Peace and Security: a Study in the Light of the Provisions of the Charter of the United Nations

Authors: Djehich Mohamed Yousri

Abstract:

As a result of the destruction and devastation left by the two world wars, the international community worked to establish a global organization based on a contractual basis, in which the Security Council was entrusted with the task of working to maintain international peace and security, and to achieve this, the United Nations Charter assigned the latter a wide authority to adapt everything It would threaten international peace and security, although the examiner of the Charter of the United Nations does not find the slightest definition of the concept of international peace and security, although these two principles are among the basic principles that the Charter stipulated the necessity of achieving, and perhaps this was also what was in the opposite case for them. And by that, we mean cases of a threat to peace, a breach of it, or an act of aggression. These terms were not dealt with in the Charter in explanation and detail, leaving ample room for the Security Council to assess each of these cases separately, and perhaps this is due to the fact that the framers of the Charter intended to set a flexible standard. It does not restrict the authority of the Security Council to carry out the adjustment process on the one hand and, on the other hand, to allow and enable the Security Council to keep pace with new developments and threats to which international peace and security are exposed. There is no doubt that the concept of international peace and security has undergone significant changes during the 70-year period that followed the establishment of the international organization. After the threat to peace and security focused - in the first stage - on cases of war or the threat of war, what distinguishes the post- The new world order is the emergence of other challenges and threats that find their source in economic, social, humanitarian, and environmental instability. Perhaps this is what the member states of the Security Council indicated during the preparation of the Peace Agenda. The expansion of the concept of peace and security is what paved the way for some permanent states to use the Security Council to legitimize and implement their decisions and take the council as a tool to implement their foreign policy and punish states instead of maintaining international peace and security, which prompted some states and jurisprudence to call for the establishment of oversight of the decisions of the Council Security on the one hand, and amending the UN Charter to make it more expressive of the aspirations of the international community, referring to the obstacles that prevent this amendment.

Keywords: peace, security, united nations charter, security council, united nations organization

Procedia PDF Downloads 70
12726 Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: cryptography, networking, quantum, encryption and decryption

Procedia PDF Downloads 179
12725 A Three Tier Secure KQML Interface with Novel Performatives

Authors: Dimple Juneja, Aarti Singh, Renu Hooda

Abstract:

Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.

Keywords: multiagent systems, KQML, FIPA ACL, performatives

Procedia PDF Downloads 405
12724 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207

Authors: Mazhar Hamayun

Abstract:

Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.

Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207

Procedia PDF Downloads 80
12723 The Awareness of Computer Science Students Regarding the Security of Location Based Games

Authors: Jacques Barnard, Magda Huisman, Gunther R. Drevin

Abstract:

Rapid expansion and development in die mobile technology market has created an opportunity for users to participate in location based games. As a consequence of this fast expanding market and new technology, it is important to be aware of the implications this has on security. This paper measures the impact on the security awareness of games’ participants, as well as on that of students at university level with regards to their various stages of input in years of studying and gamer classification. This serves to provide insight into the matter as to discernible differences in the awareness of the security implications concerning these technologies. The data was accumulated via a web questionnaire that was to be completed yearly by students from respective year groups. Results signify a meaningful disparity in security awareness among students completing the varying study years and research. This awareness, however, does not always impact on gamers.

Keywords: gamer classifications, location based games, location based data, security awareness

Procedia PDF Downloads 289
12722 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 461
12721 Policy Compliance in Information Security

Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran

Abstract:

In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.

Keywords: information technology, information security, involvement theory, policies, social bond theory

Procedia PDF Downloads 366
12720 Political Economy of Internal Dispalcement, Migration and Human Security in Zimbabwe: 1800 to Present Day

Authors: Chupicai Manuel

Abstract:

The purpose of this article is to examine the political economy and history of internal displacement, migration and human security in Zimbabwe from 1800 to present day. The article gives a timeline of major internal displacement, migration trends that took place in Zimbabwe before colonialism, through the colonial period up to the present day and examines the human security context of such periods. In view of the above, a political economy analysis will be employed to examine the different factors that promoted internal displacement and human movements from 1800 to the present day and explore the architecture of human security in Zimbabwe. The ultimate goal of this literature review is to provide a longitudinal analysis of internal displacement, migration and human security regimes that existed in Zimbabwe with the view of promoting social cohesion and nation building.

Keywords: human security, internal displacement, migration, political economy

Procedia PDF Downloads 347
12719 Dynamic Externalities and Regional Productivity Growth: Evidence from Manufacturing Industries of India and China

Authors: Veerpal Kaur

Abstract:

The present paper aims at investigating the role of dynamic externalities of agglomeration in the regional productivity growth of manufacturing sector in India and China. Taking 2-digit level manufacturing sector data of states and provinces of India and China respectively for the period of 1998-99 to 2011-12, this paper examines the effect of dynamic externalities namely – Marshall-Arrow-Romer (MAR) specialization externalities, Jacobs’s diversity externalities, and Porter’s competition externalities on regional total factor productivity growth (TFPG) of manufacturing sector in both economies. Regressions have been carried on pooled data for all 2-digit manufacturing industries for India and China separately. The estimation of Panel has been based on a fixed effect by sector model. The results of econometric exercise show that labour-intensive industries in Indian regional manufacturing benefit from diversity externalities and capital intensive industries gain more from specialization in terms of TFPG. In China, diversity externalities and competition externalities hold better prospectus for regional TFPG in both labour intensive and capital intensive industries. But if we look at results for coastal and non-coastal region separately, specialization tends to assert a positive effect on TFPG in coastal regions whereas it has a negative effect on TFPG of coastal regions. Competition externalities put a negative effect on TFPG of non-coastal regions whereas it has a positive effect on TFPG of coastal regions. Diversity externalities made a positive contribution to TFPG in both coastal and non-coastal regions. So the results of the study postulate that the importance of dynamic externalities should not be examined by pooling all industries and all regions together. This could hold differential implications for region specific and industry-specific policy formulation. Other important variables explaining regional level TFPG in both India and China have been the availability of infrastructure, level of competitiveness, foreign direct investment, exports and geographical location of the region (especially in China).

Keywords: China, dynamic externalities, India, manufacturing, productivity

Procedia PDF Downloads 120
12718 Let’s Make Waves – Changing the Landscape for the Solent’s Film Industry

Authors: Roy Hanney

Abstract:

This research study aims to develop an evidential basis to inform strategic development of the film industry in the Solent (south central) region of the UK. The density of the creative industries around the region is driving the growth of jobs. Yet, film production in particular, appears to struggle with field configuration, lacks ecological cohesion, and suffers from underdeveloped ecosystems when compared to other areas bordering the region. Though thriving, a lack of coordinated leadership results in the continued reproduction of an ill-configured, constricted and socio-economically filtered workforce. One that struggles to seize strategic opportunities arising as a consequence of the ongoing investment in UK film production around the west of London. Taking a participatory approach, the study seeks to avoid the universalism of place marketing and focus on the situatedness of the region and its specific cultural, social, and economic contexts. The staging of a series of high profile networking events provided a much needed field configuring activity and enabled the capture of voices of those currently working in the sector. It will also provided the opportunity for an exploratory network mapping of the regional creative industries as a value exchange ecosystem. It is understood that a focus on production is not in itself a solution to the challenges faced in the region. There is a need to address issues of access as a counterbalance to skewed representation among the creative workforces thus the study also aims to report on opportunities for embedding diversity and inclusion in any strategic solutions.

Keywords: creative, industries, ecosystem, ecology

Procedia PDF Downloads 94